disabledesc
enabledesc
Static task
static1
Behavioral task
behavioral1
Sample
13a558d2e51a7f4ab28a0c1a4eebb8f3_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
13a558d2e51a7f4ab28a0c1a4eebb8f3_JaffaCakes118.dll
Resource
win10v2004-20240802-en
Target
13a558d2e51a7f4ab28a0c1a4eebb8f3_JaffaCakes118
Size
5KB
MD5
13a558d2e51a7f4ab28a0c1a4eebb8f3
SHA1
f9dd77106d89989630f0f525e174ea64761981c1
SHA256
725433bd4fc6700dda0834160d42367e50e38d3b8b6497ca426f171c8a2b06a2
SHA512
c815940c122e5f6ea93edddb2caeaaa6c094f8c63cd4411e78bd9feeb9f4c113dec7d4741294a750fae017df5b82046ba19673258fcf53c3c68803a032805f4c
SSDEEP
48:qoUlNHmSJEvDbV8j6XsD51gWrdyStrK0ZuQ0PLQTnq9qtOlf9oqOkqWET:UNHQvDpFXKGkrZPnq9qPkQT
Checks for missing Authenticode signature.
resource |
---|
13a558d2e51a7f4ab28a0c1a4eebb8f3_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetCurrentThreadId
UnhookWindowsHookEx
SetWindowsHookExA
SendMessageA
ScreenToClient
PtInRect
GetWindowTextA
SetWindowTextA
EnableWindow
CallNextHookEx
_adjust_fdiv
malloc
_initterm
free
strtok
strcpy
strlen
strstr
strcmp
memmove
disabledesc
enabledesc
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ